Cutting Edge Provisioning & EHR Application Security Management Tool Developed at UC Davis Medical Center University of California Davis Health System, 2315 Stockton Blvd., Sacramento, CA 95817 Submitting Mary Pat Curry – Health Information Management Department Manager Project Team Gloria Ayala-Partida – Business Requirements External Users Subject Matter Expert Desiree Garcia – Business Requirements Internal EHR Users Subject Matter Expert (Project Lead) Carlos Aguilar – Business Requirements Subject Matter Expert & EHR Security (Project Lead) Erol Layiktez – Technical Subject Matter Expert & EHR Security Joshua Simon – Technical Subject Matter Expert & EHR Security John Nystrom – Technical Subject Matter Expert & EHR Security Mark Sy – Technical Subject Matter Expert & EHR Security Maurice Hamilton – UCD IT Dominos Lotus Notes Programmer Dan Cotton – UCD IT Manager Monica Moldovan – HIM Privacy & Security Manager Stakeholders Vincent Johnson – UCDHS Chief Operating Officer Michael Minear – UCDHS Chief Information Officer Mary Pat Curry, RHIA – UCDHS Health Information Management Department Manager Monica Moldovan, JD, MIS, CHPS – UCDHS Health Information Privacy & Security Manager Health Information and Clinical Informatics (HICI) Oversight Committee Contents Background ................................................................................................................................................... 2 Project Description – History, Problem, Opportunity, Solution ................................................................... 2 Technology Used, Design and Implementation ............................................................................................ 5 Objectives, Project Timeline and Customer Satisfaction Outcomes ............................................................ 5 Appendix ....................................................................................................................................................... 7 Page | 1 Background The UC Davis Health System (UCDHS) is a comprehensive academic health system that strives to create a healthier world through bold innovation. UCDHS manages an Electronic Health Record (EHR) that is shared across all venues of care within the Health System, it extends to community-based healthcare providers, our patients, and authorized family members. To ensure the highest level of patient care delivery, patients’ engagement and satisfaction, it is vital that our UCDHS clinicians have timely access to EHR to deliver prompt care and communicate with the patient and other memebers of the treatment team. Likewise other nursing and clinical staff must have compliant and appropriate level of EHR security, as quickly as possible to deliver care. Delays in accurate system level access may hinder providing critical care. This case study describes how the development team at UC Davis Medical Center (UCDMC), transformed our manual, time consuming, error-prone EHR access provisioning process into a ‘state of the art’ computerized, algorithm based provisioning system that grants compliant EHR access clearance based on system definitions, legal requirements, unique user attributes from various sources systems, and without any staff manual intervention. The speed and accuracy of this web based system is unparalleled in the industry, where most health organizations still rely on overly complex processes, import/export spreadsheets, EHR vendor support, manual processing of the access and manual management of the EHR security. The application is highly extensible, allowing new and expanded business rules, policy and/or regulatory changes. A recent survey of our customer, indicated that this innovative technology is notably “significantly more accurate” and “much faster” than previous systems used for managing security and provisioning our clinical end user. The EPIC Research and Development team, other nationwide hospitals and integrated delivery systems have solicited our team to share and participate in countless technical knowledge sharing sessions, with the intent and interest in modeling their EHR provisioning system and EHR application security management after UCD’s innovative tool, ‘also known as’ OPAL (Online Provisioning Access to the Legal medical record) fully designed, developed and deployed at UC Davis Medical Center. Project Description – History, Problem, Opportunity, Solution UC Davis Medical Center is an early adopter of EHR, in 2003 we went live with our EHR system and with it, came the ongoing challenge to correctly manage an ever changing workforce with dynamic roles and regulatory needs to provide the correct access for users in the course of delivering critical patient care. The EHR vendor, from 2003 to present, provided no technical integrated solution to centrally and electronically provision and manage the EHR application security and its components. This resulted in each record of approximately 10,500 users be managed manually through the use of complicated import spreadsheets, technical specification documents, coupled with collection and manual entry of a multitude of user data from different source systems, such as Human Resources System, Clinician Credentialing, Licenses and Privileges System - a mainframe repository, and other separate data sources, ultimately working towards acquiring required user values and mapping each access security level type, for each clinical venue (i.e emergency room, inpatient, ambulatory, hospital based clinic and etc) and provide timely, legally compliant, and correct level of system access clearance for our EHR users. Adding to the complexity of managing users access, was the HIPAA compliance regulations requirements of maintaining records pertaining to access controls, identity proofing, HIPAA confidentiality training, track system authorizations and approvals, through disparate systems that had to continually be updated and maintained to keep UC Davis in compliance with State and Federal regulations. As a teaching hospital and highly regarded health care facility in the region, our user types (Appendix, Figure 1) that needed to be provisioned and maintained, kept evolving and churning. Some of the unique users were international medical students, rotating residents, visiting internists, locum providers and external referring providers. Each one of our 88 EHR security templates contains a combination of Page | 2 system security points, security classes, security roles and system profiles specific to each user type and also specific to the clinical venue, which is why extensive research and collection of user attributes is critical before a EHR security template could be selected. Prior to the development of this innovative state of the art tool, the labor-intensive process to create a user account involved several administrative steps and manually receive signatures on papers for identity proofing, sponsor authorizations and HIPAA Privacy and Security Training. Another example of manual inefficiency was the communication for additional information from users, sponsors, managers, requesters, and then manually collecting the response values, copy and paste them into the EHR EPIC system approved import sheets. We also has to manually validate the data against “source systems of truth”. For example, we would have to log on to the HR People Soft system, look up staff information and then take each determinant value, enter it in our system and manually find the correct EHR access type. The manual steps of the provisioning process described above were required during account creation, for all account updates and for revocation of access. Meaningful reporting was especially challenging, cumbersome, impossible due to lack of discreet fields, and even inaccurate. The management of the EHR application security and the entire provisioning process, via manual steps was problematic to maintain due to the complexity of user attributes from multiple source systems, the complexity of EHR integrated system security and its 30+ EPIC applications/modules currently in production at UC Davis Medical Center. As the clinicians rely mainly on the EHR tool to deliver their care to patients, the process of keeping track of system security, as well as user provisioning algorithms, and clinical venue would often fail due to the manual and administrative steps from all cross-functional teams involved. Often our EHR user satisfaction would fail on account of: Access delays, due to data entry errors on the initial user request Inability to properly identify the EHR users’ job function resulting in the incorrect EHR access Delays in timely processing of new user by other departments ( HR, Provider Credentialing) Prolonged turnaround times for all requests due to need for users and managers additional signatures and attestations. Lack of duplicate record checks Loss of data integrity checks, pertaining to the user information inconsistent in source systems and subsequently this information being shared in downstream shared files across many users Manual troubleshooting of existing accounts to determine correct access and root cause issues Inefficient steps to identify, receive and maintain documentation for all staff that required legally compliant signature As the requests for access increased, use of multi-interdisciplinary EPIC EHR applications/modules continued to grow, and the legal requirements for access controls continue to expand, it was determined that a pioneered, groundbreaking and scalable technical solution would be necessary to meet all our complex mandatory regulations, and keep all user identities relevant to EHR, centrally managed. The utmost value of a user account to the EHR at UCD, is appropriate access in the most expedient manner possible, enabling the ultimate goal to provide immediate patient care. The new access system would have to meet an array of business rules, legal requirements and compliance with regulatory bodies including the following: Patient Care Expediency : Accurately create EHR user accounts with the access that provides the correct privileges and functionality within one hour of an access request being submitted Page | 3 Leverage Disparate UCD Source Data Systems: Information from Human Resources, Provider Information Tracking System, Windows Active Directory, and the EHR Clarity Database would be setup in ETL (extract, transform and load) and then made available through a structured manner that specifically supported the new tool and provided a standard SQL based way of validating data sources and user’s identity Role Based Access: Every job code at the UCD would be analyzed and specific type of user access templates would be derived from all the available data for each user, including specific clinician privileges such as determining who can document in a chart and order procedures or medications for a patient.(Appendix, Figure 6) Standard Data Management: Create and maintain the full data elements that provide all access request audit information, including the 5 Ws and recording all communications and system functions for each user/access request System Based Processing: System should electronically intake access requests and process them through a tree based decision for data accuracy and validation. Maintain and provide all communication and electronic signature pathways to remove paper base processes. System should provide intuitive way for analysts to resolve any exceptions through find and click functions and resolve errors. The system will maintain audit trail of all system activities. After a significant amount of development work, UCDHS was able to create an innovative, state of the art technical tool solution dubbed “OPAL” (Appendix Figure 3). The web based technology is able to meet all the requirements from external and internal regulatory bodies and can deliver a solution that provides the ability to gather separate data sources and ensure the user received access in a timely fashion. Additionally, OPAL ensures that the UCD workforce is compliant with regulations by having the right level of access through a series of automated logical maps that defined the user’s job role in their work department (Appendix, Figure 1), and provides built-in administrative business rules that continue to maintain the user accounts long after the initial account creation. Processes that safeguard against improper access such as account revokes, expired HIPAA documents, clinical providers with outdated privileges reviews are all included in OPAL to continually ensure proper access. In the event that an access request could not be resolved automatically, OPAL has an interface that gives an analyst an intuitive point and click solution to resolve anything preventing the delivery or removal of access. (Appendix, Figure 3) Beyond the foundational needs of OPAL to meet electronic user account regulations, OPAL was able to extend past its original framework to provide: A public facing secure web portal for external community physicians that allows for the self-enrollment to the UC Davis Physician Connect portal which allows non UC Davis providers to view their patient’s data at UC Davis New electronic web forms that use secure industry standard electronic signature captures to provide a rapid documentation process that eliminates the need for email, fax ,or paper scans All communication to the customer regarding log-in information, requests for supplementary information and the like are automatically generated from the system. Clinician records are created automatically with all of the appropriate access and security to deliver care. Complete account maintenance mechanisms and automations, such as access renewals, access revoke, attributes changes and updates, all are now handled automatically, based on the end dates in the system and input from sponsors via online web forms Built-in business rules to assure compliance with State and Federal regulations Page | 4 Electronic inventory of our EHR security structure and all its 30+ integrated applications/modules Live interfaces and built-in ETL (extract, transform and load) processes that centrally process and acquire user attributes Live account creation imports that run automatically without user management or intervention Technology Used, Design and Implementation OPAL is programmed using ColdFusion 10 with Model-View Controller (MVC) Framework which promotes code reuse and extensibility. MVC easily separates presentation layer from program logic and database interactions. OPAL is a web based application and can be run on any standard web browser. The core of OPAL consists of the application software and user interface, database, integration components and the data integrity and automation tools. Application Software and Database OPAL is written using Adobe ColdFusion 10, a platform that allowed us to rapidly build our scalable solution with fewer lines of code. To enhance the end user experience and efficiency of the application jQuery and Ajax are utilized. The data relevant to OPAL is stored on a Microsoft SQL Server 2008 database. The table structure is maintained in third normal form to optimize performance. As OPAL interacts with several other source systems, including Active Directory, there are elements of Java mixed into the code base. Integration Full Integration with secondary UCDHS source systems allows for a collection of data not previously possible. This is one of the key drivers of automation and saves analysts significant amounts of time. Prior to OPAL analysts needed to log in and out of several systems to gather information or open various MS Office files. OPAL automatically interacts with more than seven external UCDHS systems including: Central Authentication System (CAS) – Authentication Active Directory – Allows access to employee IT records, including login name Campus LDAP Server – Allows access to medical student demographics PITS (UCDHS Provider Tracking system) – Allows access to provider records PeopleSoft (UC Payroll System) – Allows access to employee demographics HP Service Manager (UCDHS Service Request System) – Self Service Portal to request EHR Access EHR Reporting Database – Allows for cross checking of EHR user data Data Integrity and Automation OPAL processes most requests automatically and transmits the user record directly to the EHR server; therefore, creating accounts without human intervention. The requests that need review or manual input stop and are processed via the analysts’ graphical user interface. Automated emails are sent to the users to inform them when access has been created, or to request additional information as needed. Checks and controls are always in place to reduce errors. All input is cross checked against multiple data sources and when necessary, OPAL automatically assigns an analyst to review an exception or data conflict. The OPAL database is managed and backed up by UCDHS IT department and it is also clustered. Role based tools in OPAL allows analysts to override system decisions as necessary without the need of an application developer. Objectives, Project Timeline and Customer Satisfaction Outcomes The two most critical components of EHR security access provisioning are timeliness and accuracy. Providers must be granted access as quickly as possible as to not inhibit patient care and that access must be correct for the same patient care reasons. Previously, the provisioning process relied on the speed and accuracy of a person processing the request. The transition to OPAL allowed us the opportunity to move away from manual/error prone processing to automatic processing, whereby the system does most of the decision handling. Page | 5 Even the brightest vision cannot be executed without adequate funding. The biggest challenge for UCDHS has been limited financial resources aggravated by competing priorities. Another difficult challenge was overcoming the lack of an economical “off the shelf/plug and play” provisioning software system that would integrate with our EHR (EPIC) and address the complex application security and the access provisioning needs of an integrated health care setting like ours. Due to the lack of a precedent similar technology in the healthcare industry, with capability to work with EPIC specific security components, our project was approached in 3 main phases (Apendix, Figure 5). We first automated the process for UCD workforce in 2009 over a period of eight months. Later in 2010, as part of phase two, we added the community based physicians and other memebers of the treatment team over a period of thirteen months. Finally in 2012 after several lessons learned and an intensive ten months effort to acquire all technical and business requirements, we developed and deployed OPAL to handle both internal and external users, as well as the 30+ EPIC applications/modules security components. Several breakthroughs were accomplished as part of the in-house development and implementation of these technologies. The foremost customer satisfaction comes from the ‘patient care centered’ turnaround time of our process. The patient care focus can be grouped into four areas: Near real-time provisioning reduced provider downtime and dissatisfaction (Appendix, Figure 4) and ultimately improved our patient safety outcome. Automatic access template assignments reduce the risk of the wrong access being granted due to human error. Sophisticated exception handling technology allows administrators to quickly identify and correct problems hindering the completion of EHR access security request. (i.e incomplete demographics, unauthorized approvers and bad data from external systems) Advanced logging protocols allow auditors to view all actions by the system taken to grant access, including meeting compliance requirements via automatic decision making and automatic emails. Integrity checking across multiple systems allows for data to be corrected in external systems that might otherwise go unnoticed. Another area of success where this provisioning system meets crucial objectives is centered on external technology and HIPAA audits. The EHR security management, access/provisioning processes, the tool itself and the HIM Privacy and Security team have undergone many internal and external audits and received complements on the stateof-the-art tool, our procedure and detailed documentation we use in our process. The system maintains safeguards and access controls, ensuring the right person gets the right access; assuring UCDHS is compliant with State and Federal laws and avoids fines. This award winning creative processes coupled with the innovative tool, served as the building blocks that aided UCDHS to obtain the HIMSS Stage 7 designation and a HIMSS Davies Award signifying excellence and outstanding achievement in the implementation and value of EHR. OPAL has successfully passed several Joint Commission and CMS audits. These regulatory bodies define an objective review and distinguish the system for all its adjudications. UCDHS’ philosophy to provide EHR access accurately and timely without interfering with patient care was successful only with the direct support of senior executive leadership. A combination of administrative policies and innovative IT tools were effectively embedded into business processes which allow for immediate development of the OPAL tools needed to be successful. Page | 6 Ap ppendix Figu ure 1 ‐ UCDHS R Role Based Acccess F igure 2 – Acceess Request Tim meliness by Mo onth Wh ho are our users? What functions f do they perform m? 1% 3% 5% A Anesthesia 1% E ED 2% % 24% 13% IP P Technical/Clerical M MD/NP/PA 5% IP P Nursing M Medical Student N Non-Clinical 6% N Nursing Student O Clerical OP 17% 4% 19% O Nursing OP P Pharmacy P Psychotherapy April 2009 – Nov 2009 Jan 2010 – Feb 2011 Oct 2012 – April 2013 April 2013 June 2013 Figure 3 ‐ Scree enshot of OPALL Figure 4 – Customer Satiisfaction Data Figure 5 – Project Timeline Figure 6 – EH HR Orders Privvileges based o on ccredentialing d data Phase I - Created and a defined Project Charrter for Provisioning Technical and busiiness requirements gatheering Developed and dep ployed interim Domino solution Phase II - Created and defined scope for ex xternal users Technical and busiiness requirements gatheering Developed and dep ployed interim Access so olution Phase III - OPAL Development D Planning Technical and busiiness requirements gatheering Integrate external and a Internal users into one tool In Scope evaluatio on of end user experiencee Application Development Development Com mplete Unit and User Accceptance Testing ETL’s created for access request extraction n Integrated the web b based processing system m Internal P&P creatted for administrators Go Live Page | 7